The document discusses considerations for developing a robust mobile security strategy for an enterprise. It covers questions to ask, defining security policies, risks and threats, authentication, authorization, protecting data, securing communications, application security, device management, and enterprise mobility management. It emphasizes the importance of mobile device management, strong authentication, data encryption, application wrapping, and security policies.